Analysis
-
max time kernel
11s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-02-2023 23:47
Behavioral task
behavioral1
Sample
EliStarA.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
EliStarA.exe
Resource
win10v2004-20230220-en
dmalockerhawkeyelockylocky_osirismodiloaderwannacrydiscoverykeyloggerpersistenceransomwarespywarestealertrojanupxworm
windows10-2004-x64
24 signatures
150 seconds
General
-
Target
EliStarA.exe
-
Size
1.7MB
-
MD5
6b8dcb09a6f8e836b5dcc600d11c6223
-
SHA1
b0a1582b9e9871064afae5cb6b1d369599506763
-
SHA256
11aaa12e58f39f192b4f66e56cd0e343d73b69a48dc77a6dfb936483de120152
-
SHA512
feb8bd04778b29efc9b0128dbfd9562368eb825a560dc610abed6a73de1dc7bd33e5e198b439b36828d0a66d4657e354d4a65646141ad3425bed6fd74cb7fcae
-
SSDEEP
49152:lJCDpfmhr2qIhBCwb8lIgwylCJHXv5y7lE8X:6HB/b8KgZA5E
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1344-54-0x0000000000400000-0x00000000005BF000-memory.dmp upx behavioral1/memory/1344-61-0x0000000000400000-0x00000000005BF000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\SYSTEM32 EliStarA.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 EliStarA.exe 1344 EliStarA.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1344 EliStarA.exe Token: SeRestorePrivilege 1344 EliStarA.exe Token: SeShutdownPrivilege 1344 EliStarA.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 EliStarA.exe 1344 EliStarA.exe